Which statement describes the operation of an access point in Rogue Location Discovery Protocol
mode?
A.
The AP uses the existing wireless infrastructure in order to scan for rogue APs. Once discovered,
these rogues are added to a local list that includes the rogues’ BSSIDs, MAC addresses, and any
discovered security provisions (WPA, WEP, etc.).
B.
The AP detects a rogue client, and then the network administrator is able to contain both the
rogue AP and the rogue clients. This can be achieved because 802.11 deauthentication packets are
sent to clients that are associated to rogue APs, so threats such as holes are mitigated.
C.
The AP moves to the rogue channel and attempts to connect to the rogue as a client. The AP then
tries to obtain an IP address and forwards a UDP packet to the controller through the rogue. If the
controller receives this packet, the network administrator is notified that a rogue AP has been
discovered on the wired network.
D.
The AP determines whether or not a rogue access point is on a trusted network. It does not
provide RF service of any kind, but rather receives periodic rogue access point reports from the
controller, and sniffs all ARP packets. If it finds a match between an ARP request and a MAC address
it receives from the controller, it generates a rogue access point alert to the controller.